Please see attached. Answer questions and follow the instructions

Network Forensics

Lab 5

Name:

G#:

Lab Questions:

  • ANSWERS MUST BE IN COMPLETE SENTENCES FOR FULL CREDIT.

  • USE YOUR OWN WORDS.

  • YOU WILL NOT RECEIVE CREDIT FOR QUESTIONS THAT ASK FOR DEFINITIONS OR EXAMPLES IF YOU USE THE ONES GIVEN IN THE DIRECTIONS.

  1. Google ARP spoofing. Write a definition below in your own words.


  1. What is promiscuous mode (in the context of a packet sniffer):


  1. In your own words, describe the three way handshake?

  1. Where are cookies stored?

  1. Name two types of index.dat files that are of forensic interest?


  1. How might a criminal use a key logger?

  1. How might an investigator use a key logger? What legal authority would be required before a keylogger could be used?


  1. What federal laws might be violated by unauthorized use of a key logger?




©2007, 2014, 2015 Anne Marchant, Rebecca J. Tenally, Alex Mbaziir

By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.